This system is for the use of authorized
users only. Unauthorized use may be monitored and recorded. In the course of
such monitoring or through system maintenance, the activities of authorized
users may be monitored.